This post is by a banned member (Francisc0ubz) - Unhide
04 March, 2022 - 06:35 PM
Reply
This post is by a banned member (briantoo) - Unhide
04 March, 2022 - 09:05 PM
Reply
This post is by a banned member (mazda811) - Unhide
05 March, 2022 - 12:58 AM
Reply
This post is by a banned member (laski) - Unhide
05 March, 2022 - 02:43 AM
Reply
This post is by a banned member (BumfacePB) - Unhide
05 March, 2022 - 05:46 AM
Reply
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show MoreNO LIKE = REPORT
This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.
This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
Wow. This is absolutely incredible. Applauses from me!
This post is by a banned member (bottlepfwater) - Unhide
05 March, 2022 - 06:23 PM
Reply
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show MoreThis mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
wow wow wow wow wow wow
This post is by a banned member (lisemonspo1974) - Unhide
06 March, 2022 - 04:10 AM
Reply
This post is by a banned member (stegmanb77) - Unhide
06 March, 2022 - 08:06 AM
Reply
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show MoreNO LIKE = REPORT
This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.
This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
Thanka